{"title":"网络层物联网安全分析","authors":"Rahul Sharma, Nitin Pandey, S. Khatri","doi":"10.1109/ICRITO.2017.8342495","DOIUrl":null,"url":null,"abstract":"The new future for the connectivity to the world are the IoT devices which interconnect heterogeneous object with each other. These IoT devices will make an autonomous world which will have the ability to exchange information and make decisions at the real time. But since these devices are very small therefore they have constrained to memory, processing, battery powered and resources due to which chances of an attack on IoT devices are more than normal devices. To overcome this these IoT devices use lightweight protocols and standards at each layer. At the network layer, 6LoWPAN and RPL are the two main protocols which transfer the data from one device to another. This paper focuses on analyzing different types of attack on the 6LoWPAN and RPL and a new solution for the increased rank attack which helps to stop the loop and resource depletion.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Analysis of IoT security at network layer\",\"authors\":\"Rahul Sharma, Nitin Pandey, S. Khatri\",\"doi\":\"10.1109/ICRITO.2017.8342495\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The new future for the connectivity to the world are the IoT devices which interconnect heterogeneous object with each other. These IoT devices will make an autonomous world which will have the ability to exchange information and make decisions at the real time. But since these devices are very small therefore they have constrained to memory, processing, battery powered and resources due to which chances of an attack on IoT devices are more than normal devices. To overcome this these IoT devices use lightweight protocols and standards at each layer. At the network layer, 6LoWPAN and RPL are the two main protocols which transfer the data from one device to another. This paper focuses on analyzing different types of attack on the 6LoWPAN and RPL and a new solution for the increased rank attack which helps to stop the loop and resource depletion.\",\"PeriodicalId\":357118,\"journal\":{\"name\":\"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)\",\"volume\":\"125 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICRITO.2017.8342495\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRITO.2017.8342495","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The new future for the connectivity to the world are the IoT devices which interconnect heterogeneous object with each other. These IoT devices will make an autonomous world which will have the ability to exchange information and make decisions at the real time. But since these devices are very small therefore they have constrained to memory, processing, battery powered and resources due to which chances of an attack on IoT devices are more than normal devices. To overcome this these IoT devices use lightweight protocols and standards at each layer. At the network layer, 6LoWPAN and RPL are the two main protocols which transfer the data from one device to another. This paper focuses on analyzing different types of attack on the 6LoWPAN and RPL and a new solution for the increased rank attack which helps to stop the loop and resource depletion.